Skip to main content
guest
Join
|
Help
|
Sign In
LargeScaleComputing
Home
guest
|
Join
|
Help
|
Sign In
LargeScaleComputing
Wiki Home
Recent Changes
Pages and Files
Members
Discussion
CSCI 365
Overview
Syllabus
Slides
Lab 1
Lab 2
Lab 3
Lab Discussion
Wiki Update
General Topics
:
Tutorials/References
Buzzwords
VSAM
ISFP
ISFP Editor
Java vs Cobol
MF Capabilities
Databases
Transactions
Security
Reliability
Connectivity
Security
Edit
15
…
0
Tags
No tags
Notify
RSS
Backlinks
Source
Print
Export (PDF)
Owner(s):
What is security?
Very Important part of computers
The most critical information is now stored on computers
This information must not be made available to everyone
The Three Basic Concepts: --each concept must be implemented
Confidentiality (Authorization)
Integrity (Authentication)
Availablility
The Major Security Threats
Hackers
A hacker is a person who specializes in undermining security mechanisms implemented for computer and network systems.
Unauthorized users
An unaurthorized user is a user that has gained access to a system without permission from the Administrator.
Malware
Software designed to infiltrate or damage a computer system without the owner's consent.
Hooks
Similar to back doors, hooks are left by programers as ways to re-gain access to thier software.
Confidentiality Models
Flow Model
Lays out the scheme which relates users to objects
Access Control
Same as flow model but also includes types of operations that can be performed
Operations
Read only
Write only
Execute
Roles
*Classify Data* --
it is important to classify data into varying levels of security.
Integrity
Authenticity
Accountability
Non-repudiation
Threats To Integrity
Salami Slicing
Falsification
Availability
The system/data is available for use
Logging/Auditing
Mainframe Security Tools
RACF
Resource Access Control Facility
Identify/authenticate users
Authorization
Log and report
Security administrator controls access
RACF works with parellel sysplex
ACF2
Access Control Facility 2
Javascript Required
You need to enable Javascript in your browser to edit pages.
help on how to format text
Turn off "Getting Started"
Home
...
Loading...
What is security?
The Three Basic Concepts: --each concept must be implemented
The Major Security Threats
Confidentiality Models
Roles
*Classify Data* -- it is important to classify data into varying levels of security.
Integrity
Threats To Integrity
Availability
Mainframe Security Tools